Answer:
Attackers can exploit insecure session termination by hijacking active sessions or creating unauthorized sessions to gain access to protected resources, bypassing authorization.
Attackers can exploit insecure session termination by hijacking active sessions or creating unauthorized sessions to gain access to protected resources, bypassing authorization.
You may be interested in:
Web Security MCQs - PART 2